Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Information networks are ubiquitous in many applications and analysis on such networks has attracted significant attention in the academic communities. One of the most important ...
The handling of situations where multiple visual information occurs requires the fusion of visual information. This is a very common task found in the processing of multisource / ...
Quantitative analysis of cardiac motion is of great clinical interest in assessing ventricular function. Real-time 3-D (RT3D) ultrasound transducers provide valuable threedimensio...
Many network applications have stringent end-to-end latency requirements, including VoIP and interactive video conferencing, automated trading, and high-performance computing—wh...
Ramana Rao Kompella, Kirill Levchenko, Alex C. Sno...